CVE-2026-34524
Received Received - Intake
Path Traversal in SillyTavern Allows Arbitrary File Access

Publication date: 2026-04-02

Last updated on: 2026-04-13

Assigner: GitHub, Inc.

Description
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sillytavern sillytavern to 1.17.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated attacker to read and delete arbitrary files within their user data root directory, including sensitive files such as secrets.json and settings.json.

This unauthorized access and modification of sensitive user data can lead to breaches of confidentiality and integrity, which are critical aspects of compliance with standards like GDPR and HIPAA.

Specifically, the exposure and potential deletion of sensitive configuration and secret files could result in violations of data protection requirements, potentially leading to unauthorized disclosure or loss of protected information.

Therefore, until patched, this vulnerability poses a significant risk to maintaining compliance with regulations that mandate strict controls over access to and protection of sensitive data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to exploit the path traversal flaw in the SillyTavern chat endpoints using crafted requests that manipulate the avatar_url parameter with traversal sequences such as "..".

Example commands to test for the vulnerability include using curl to read or delete arbitrary files under the user data root by sending requests to the /api/chats/export and /api/chats/delete endpoints.

  • To read a sensitive file (e.g., secrets.json): curl -b cookie.txt -H "x-csrf-token: $TOKEN" -H "content-type: application/json" \ -d '{"avatar_url":"..","is_group":false,"file":"secrets.json","format":"jsonl","exportfilename":"x"}' \ http://TARGET:8000/api/chats/export
  • To delete a sensitive file (e.g., settings.json): curl -b cookie.txt -H "x-csrf-token: $TOKEN" -H "content-type: application/json" \ -d '{"avatar_url":"..","chatfile":"settings.json"}' \ http://TARGET:8000/api/chats/delete

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade SillyTavern to version 1.17.0 or later, where the vulnerability has been patched by improving input validation and path handling.

Until the upgrade is applied, restrict access to the affected endpoints to trusted users only and monitor for suspicious activity involving the avatar_url parameter.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including loss of confidentiality, integrity, and availability of user data.

  • Confidentiality: Attackers can read sensitive files such as secrets.json, exposing private information.
  • Integrity: Attackers can delete critical files like settings.json, potentially corrupting or altering user data.
  • Availability: Deletion of important files can disrupt account functionality and availability of user data.

The risk is especially significant in multi-user or remotely accessible deployments where attackers have network access and low complexity is needed to exploit.


Can you explain this vulnerability to me?

CVE-2026-34524 is a path traversal vulnerability in SillyTavern versions up to 1.16.0 that affects the chat export and delete endpoints. An authenticated attacker can manipulate the avatar_url parameter with path traversal sequences like ".." to read or delete arbitrary files within their user data root directory.

The vulnerability exists because input validation only blocks forward slashes and NUL bytes but does not block ".." segments, allowing attackers to escape the intended chat directory and access files outside it.

This flaw allows attackers to read sensitive files such as secrets.json and delete important files like settings.json by exploiting the way file paths are constructed in the application.

Authentication is required to exploit this vulnerability, and it was fixed in version 1.17.0 by improving input validation and path handling.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart